input
stringlengths
30
54
output
stringlengths
69
4.21k
Techniques related with vulnerability CVE-2019-0803
CVE-2019-0803 in Windows. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-6964
CVE-2020-6964 in GE CARESCAPE Systems. Has primary impact with T1190 : Exploit Public-Facing Application. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2020-11651
CVE-2020-11651 in SaltStack Salt before 2019.2.4 and 3000 before 3000.2.. Is related with T1528 : Steal Application Access Token. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2019-1215
CVE-2019-1215, State: PUBLISHED, Published: 2019-09-11T21:24:58, Updated: 2024-08-04T18:13:29.707Z, Description: An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-6366
CVE-2016-6366 in Cisco Adaptive Security Appliance. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-3387
CVE-2020-3387 in Cisco SD-WAN vManage. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2019-11932
CVE-2019-11932, State: PUBLISHED, Published: 2019-10-03T21:13:47, Updated: 2024-08-04T23:10:29.690Z, Description: A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5279
CVE-2020-5279 in PrestaShop. Has primary impact with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2018-8111
CVE-2018-8111, State: PUBLISHED, Published: 2018-06-14T12:00:00, Updated: 2024-08-05T06:46:13.454Z, Description: A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8110, CVE-2018-8236., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-5910
CVE-2019-5910, State: PUBLISHED, Published: 2019-02-13T18:00:00, Updated: 2024-08-04T20:09:23.783Z, Description: Directory traversal vulnerability in HOUSE GATE App for iOS 1.7.8 and earlier allows remote attackers to read arbitrary files via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2011-1331
CVE-2011-1331, State: PUBLISHED, Published: 2011-07-18T22:00:00, Updated: 2024-08-06T22:21:34.200Z, Description: JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document, as exploited in the wild in early 2011., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T0873
MITRE T0873 : Project File Infection from ics Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further [Execution](TA0104) and [Persistence](TA0110) techniques. (Citation: PLCdev) Adversaries may export their own code into project files with conditions to execute at specific intervals. (Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing. (Citation: PLCdev)
Techniques related with vulnerability CVE-2020-5386
CVE-2020-5386 in Elastic Cloud Storage. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2020-15199
CVE-2020-15199 in tensorflow. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2019-3568
CVE-2019-3568 in WhatsApp for Android. Is related with T1477 : Exploit via Radio Interfaces.
Techniques related with vulnerability CVE-2020-15094
CVE-2020-15094 in symfony. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1040 : Network Sniffing.
Techniques related with vulnerability CVE-2018-0622
CVE-2018-0622 in DHC Online Shop App for Android. Is related with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2019-13555
CVE-2019-13555, State: PUBLISHED, Published: 2019-11-13T22:27:22, Updated: 2024-08-04T23:57:39.411Z, Description: In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-6287
CVE-2014-6287, State: PUBLISHED, Published: 2014-10-07T10:00:00, Updated: 2024-08-06T12:10:13.249Z, Description: The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11054
CVE-2020-11054, State: PUBLISHED, Published: 2020-05-07T20:35:29, Updated: 2024-08-04T11:21:14.636Z, Description: In qutebrowser versions less than 1.11.1, reloading a page with certificate errors shows a green URL. After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (colors.statusbar.url.success_https). While the user already has seen a certificate error prompt at this point (or set content.ssl_strict to false, which is not recommended), this could still provide a false sense of security. This has been fixed in 1.11.1 and 1.12.0. All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested. Backported patches for older versions (greater than or equal to 1.4.0 and less than or equal to 1.10.2) are available, but no further releases are planned., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.5, Base Severity: LOW, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-7187
CVE-2014-7187, State: PUBLISHED, Published: 2014-09-28T19:00:00, Updated: 2024-08-06T12:40:19.211Z, Description: Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1518
MITRE T1518 : Software Discovery from enterprise Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from [Software Discovery](T1518) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Such software may be deployed widely across the environment for configuration management or security reasons, such as [Software Deployment Tools](T1072), and may allow adversaries broad access to infect devices or move laterally. Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable to [Exploitation for Privilege Escalation](T1068).
Techniques related with vulnerability CVE-2018-19010
CVE-2018-19010 in Delta Monitor. Has primary impact with T1499 : Endpoint Denial of Service . Has an exploitation technique T1190 : Exploit Public-Facing Application .
Describe MITRE technique T1539
MITRE T1539 : Steal Web Session Cookie from enterprise An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication token after a user has authenticated to a website. Cookies are often valid for an extended period of time, even if the web application is not actively used. Cookies can be found on disk, in the process memory of the browser, and in network traffic to remote systems. Additionally, other applications on the targets machine might store sensitive authentication cookies in memory (e.g. apps which authenticate to cloud services). Session cookies can be used to bypasses some multi-factor authentication protocols.(Citation: Pass The Cookie) There are several examples of malware targeting cookies from web browsers on the local system.(Citation: Kaspersky TajMahal April 2019)(Citation: Unit 42 Mac Crypto Cookies January 2019) Adversaries may also steal cookies by injecting malicious JavaScript content into websites or relying on [User Execution](T1204) by tricking victims into running malicious JavaScript in their browser.(Citation: Talos Roblox Scam 2023)(Citation: Krebs Discord Bookmarks 2023) There are also open source frameworks such as `Evilginx2` and `Muraena` that can gather session cookies through a malicious proxy (e.g., [Adversary-in-the-Middle](T1557)) that can be set up by an adversary and used in phishing campaigns.(Citation: Github evilginx2)(Citation: GitHub Mauraena) After an adversary acquires a valid cookie, they can then perform a [Web Session Cookie](T1550.004) technique to login to the corresponding web application.
Describe the vulnerability CVE-2014-1815
CVE-2014-1815, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.381Z, Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as exploited in the wild in May 2014, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0310., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T0804
MITRE T0804 : Block Reporting Message from ics Adversaries may block or prevent a reporting message from reaching its intended target. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. By blocking these reporting messages, an adversary can potentially hide their actions from an operator. Blocking reporting messages in control systems that manage physical processes may contribute to system impact, causing inhibition of a response function. A control system may not be able to respond in a proper or timely manner to an event, such as a dangerous fault, if its corresponding reporting message is blocked. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)
Describe MITRE technique T1550.002
MITRE T1550.002 : Pass the Hash from enterprise Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment, bypassing normal system access controls. Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This method bypasses standard authentication steps that require a cleartext password, moving directly into the portion of the authentication that uses the password hash. When performing PtH, valid password hashes for the account being used are captured using a [Credential Access](TA0006) technique. Captured hashes are used with PtH to authenticate as that user. Once authenticated, PtH may be used to perform actions on local or remote systems. Adversaries may also use stolen password hashes to "overpass the hash." Similar to PtH, this involves using a password hash to authenticate as a user but also uses the password hash to create a valid Kerberos ticket. This ticket can then be used to perform [Pass the Ticket](T1550.003) attacks.(Citation: Stealthbits Overpass-the-Hash)
Techniques related with vulnerability CVE-2019-1611
CVE-2019-1611 in Firepower 4100 Series Next-Generation Firewalls. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2017-2404
CVE-2017-2404 in iOS before 10.3. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-9019
CVE-2019-9019, State: PUBLISHED, Published: 2019-02-22T20:00:00Z, Updated: 2024-09-16T17:23:54.401Z, Description: The British Airways Entertainment System, as installed on Boeing 777-36N(ER) and possibly other aircraft, does not prevent the USB charging/data-transfer feature from interacting with USB keyboard and mouse devices, which allows physically proximate attackers to conduct unanticipated attacks against Entertainment applications, as demonstrated by using mouse copy-and-paste actions to trigger a Chat buffer overflow or possibly have unspecified other impact., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-6277
CVE-2014-6277, State: PUBLISHED, Published: 2014-09-27T22:00:00, Updated: 2024-08-06T12:10:13.286Z, Description: GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2016-4656
CVE-2016-4656, State: PUBLISHED, Published: 2016-08-25T21:00:00, Updated: 2024-08-06T00:39:25.780Z, Description: The kernel in Apple iOS before 9.3.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3735
CVE-2019-3735, State: PUBLISHED, Published: 2019-06-20T21:43:26.331005Z, Updated: 2024-09-17T00:12:00.256Z, Description: Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management Vulnerability. A malicious local user can exploit this vulnerability by inheriting a system thread using a leaked thread handle to gain system privileges on the affected machine., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-8543
CVE-2017-8543 in Microsoft Windows. Is related with T1210 : Exploitation of Remote Services.
Describe MITRE technique T1518.001
MITRE T1518.001 : Security Software Discovery from enterprise Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as cloud monitoring agents and anti-virus. Adversaries may use the information from [Security Software Discovery](T1518.001) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Example commands that can be used to obtain security software information are [netsh](S0108), `reg query` with [Reg](S0075), `dir` with [cmd](S0106), and [Tasklist](S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for. It is becoming more common to see macOS malware perform checks for LittleSnitch and KnockKnock software. Adversaries may also utilize the [Cloud API](T1059.009) to discover cloud-native security software installed on compute infrastructure, such as the AWS CloudWatch agent, Azure VM Agent, and Google Cloud Monitor agent. These agents may collect metrics and logs from the VM, which may be centrally aggregated in a cloud-based monitoring platform.
Techniques related with vulnerability CVE-2020-6993
CVE-2020-6993 in Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2018-20753
CVE-2018-20753 in Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5. Is related with T1212 : Exploitation for Credential Access.
Describe the vulnerability CVE-2015-7931
CVE-2015-7931, State: PUBLISHED, Published: 2015-12-24T01:00:00, Updated: 2024-08-06T08:06:31.287Z, Description: The Java client in Adcon Telemetry A840 Telemetry Gateway Base Station does not authenticate the station device, which allows man-in-the-middle attackers to spoof devices and obtain sensitive information by reading cleartext packet data, related to the lack of SSL support., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2015-0072
CVE-2015-0072 in Internet Explorer 9 through 11. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2020-0636
CVE-2020-0636, State: PUBLISHED, Published: 2020-01-14T23:11:34, Updated: 2024-08-04T06:11:04.575Z, Description: An elevation of privilege vulnerability exists in the way that the Windows Subsystem for Linux handles files, aka 'Windows Subsystem for Linux Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-8852
CVE-2018-8852 in e-Alert Unit (non-medical device). Has primary impact with T1563 : Remote Service Session Hijacking.
Describe the vulnerability CVE-2018-14809
CVE-2018-14809, State: PUBLISHED, Published: 2018-09-26T20:00:00Z, Updated: 2024-09-16T22:03:37.405Z, Description: Fuji Electric V-Server 4.0.3.0 and prior, A use after free vulnerability has been identified, which may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-14819
CVE-2018-14819 in V-Server. Has primary impact with T1574 : Hijack Execution Flow.
Techniques related with vulnerability CVE-2020-3237
CVE-2020-3237 in Cisco IOx. Has primary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2017-11882
CVE-2017-11882, State: PUBLISHED, Published: 2017-11-15T03:00:00Z, Updated: 2024-09-16T17:03:49.911Z, Description: Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2015-2502
CVE-2015-2502, State: PUBLISHED, Published: 2015-08-19T10:00:00, Updated: 2024-08-06T05:17:27.264Z, Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-6415
CVE-2016-6415 in Cisco IOS, IOS XE, IOS XR and PIX. Is related with T1212 : Exploitation for Credential Access.
Describe MITRE technique T0836
MITRE T0836 : Modify Parameter from ics Adversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed and may specify additional options. For example, a program on a control system device dictating motor processes may take a parameter defining the total number of seconds to run that motor. An adversary can potentially modify these parameters to produce an outcome outside of what was intended by the operators. By modifying system and process critical parameters, the adversary may cause [Impact](TA0105) to equipment and/or control processes. Modified parameters may be turned into dangerous, out-of-bounds, or unexpected values from typical operations. For example, specifying that a process run for more or less time than it should, or dictating an unusually high, low, or invalid value as a parameter.
Describe the vulnerability CVE-2020-5362
CVE-2020-5362, State: PUBLISHED, Published: 2020-06-10T20:40:12.957208Z, Updated: 2024-09-17T02:41:23.331Z, Description: Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7.1, Base Severity: HIGH, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-14508
CVE-2020-14508, State: PUBLISHED, Published: 2020-08-25T13:15:19.248229Z, Updated: 2024-09-16T16:33:48.741Z, Description: GateManager versions prior to 9.2c, The affected product is vulnerable to an off-by-one error, which may allow an attacker to remotely execute arbitrary code or cause a denial-of-service condition., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-3397
CVE-2020-3397, State: PUBLISHED, Published: 2020-08-27T15:40:34.148007Z, Updated: 2024-11-13T18:09:56.819Z, Description: A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this specific, valid BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause one of the BGP-related routing applications to restart multiple times, leading to a system-level restart. Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe MITRE technique T1499.003
MITRE T1499.003 : Application Exhaustion Flood from enterprise Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in web applications may be highly resource intensive. Repeated requests to those features may be able to exhaust system resources and deny access to the application or the server itself.(Citation: Arbor AnnualDoSreport Jan 2018)
Techniques related with vulnerability CVE-2017-11882
CVE-2017-11882 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2017-16651
CVE-2017-16651 in Roundcube Webmail. Is related with T1005 : Data from Local System. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-15956
CVE-2019-15956 in Cisco Web Security Appliance (WSA). Has primary impact with T1499 : Endpoint Denial of Service. Has primary impact with T1098 : Account Manipulation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2018-9206
CVE-2018-9206 in Blueimp jQuery-File-Upload. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2018-15782
CVE-2018-15782, State: PUBLISHED, Published: 2019-01-16T20:00:00Z, Updated: 2024-09-17T03:38:58.943Z, Description: The Quick Setup component of RSA Authentication Manager versions prior to 8.4 is vulnerable to a relative path traversal vulnerability. A local attacker could potentially provide an administrator with a crafted license that if used during the quick setup deployment of the initial RSA Authentication Manager system, could allow the attacker unauthorized access to that system., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7.7, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2009-1136
CVE-2009-1136, State: PUBLISHED, Published: 2009-07-15T15:00:00, Updated: 2024-08-07T05:04:47.977Z, Description: The Microsoft Office Web Components Spreadsheet ActiveX control (aka OWC10 or OWC11), as distributed in Office XP SP3 and Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 Gold and SP1, and Office Small Business Accounting 2006, when used in Internet Explorer, allows remote attackers to execute arbitrary code via a crafted call to the msDataSourceObject method, as exploited in the wild in July and August 2009, aka "Office Web Components HTML Script Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-11084
CVE-2018-11084 in Garden-runC. Has primary impact with T1496 : Resource Hijacking.
Describe the vulnerability CVE-2018-11776
CVE-2018-11776, State: PUBLISHED, Published: 2018-08-22T13:00:00Z, Updated: 2024-09-16T19:36:52.447Z, Description: Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-18987
CVE-2018-18987, State: PUBLISHED, Published: 2018-11-30T18:00:00, Updated: 2024-08-05T11:23:08.984Z, Description: VT-Designer Version 2.1.7.31 is vulnerable by the program populating objects with user supplied input via a file without first checking for validity, allowing attacker supplied input to be written to known memory locations. This may cause the program to crash or allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2016-7189
CVE-2016-7189, State: PUBLISHED, Published: 2016-10-14T01:00:00, Updated: 2024-08-06T01:50:47.627Z, Description: The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-6563
CVE-2019-6563, State: PUBLISHED, Published: 2019-03-05T21:00:00Z, Updated: 2024-09-16T18:44:20.929Z, Description: Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11030
CVE-2020-11030, State: PUBLISHED, Published: 2020-04-30T22:15:14, Updated: 2024-08-04T11:21:14.171Z, Description: In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33)., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-0199
CVE-2017-0199, State: PUBLISHED, Published: 2017-04-12T14:00:00, Updated: 2024-08-05T12:55:19.131Z, Description: Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-12024
CVE-2020-12024, State: PUBLISHED, Published: 2020-06-29T13:51:31, Updated: 2024-08-04T11:48:58.000Z, Description: Baxter ExactaMix EM 2400 versions 1.10, 1.11, 1.13, 1.14 and ExactaMix EM1200 Versions 1.1, 1.2, 1.4 and 1.5 does not restrict access to the USB interface from an unauthorized user with physical access. Successful exploitation of this vulnerability may allow an attacker with physical access to the system the ability to load an unauthorized payload or unauthorized access to the hard drive by booting a live USB OS. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2015-7756
CVE-2015-7756 in Juniper ScreenOS 6. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2019-16784
CVE-2019-16784 in PyInstaller. Has primary impact with T1190 : Exploit Public-Facing Application. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059.006 : Python.
Describe the vulnerability CVE-2018-2894
CVE-2018-2894, State: PUBLISHED, Published: 2018-07-18T13:00:00, Updated: 2024-10-02T20:21:29.376Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1068
MITRE T1068 : Exploitation for Privilege Escalation from enterprise Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions. When initially gaining access to a system, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and software commonly running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable. This could also enable an adversary to move from a virtualized environment, such as within a virtual machine or container, onto the underlying host. This may be a necessary step for an adversary compromising an endpoint system that has been properly configured and limits other privilege escalation methods. Adversaries may bring a signed vulnerable driver onto a compromised machine so that they can exploit the vulnerability to execute code in kernel mode. This process is sometimes referred to as Bring Your Own Vulnerable Driver (BYOVD).(Citation: ESET InvisiMole June 2020)(Citation: Unit42 AcidBox June 2020) Adversaries may include the vulnerable driver with files delivered during Initial Access or download it to a compromised system via [Ingress Tool Transfer](T1105) or [Lateral Tool Transfer](T1570).
Describe the vulnerability CVE-2016-9079
CVE-2016-9079, State: PUBLISHED, Published: 2018-06-11T21:00:00, Updated: 2024-08-06T02:42:10.169Z, Description: A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-13538
CVE-2019-13538 in 3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0. Is related with T1059.007 : JavaScript. Is related with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2014-3413
CVE-2014-3413 in MySQL server in Juniper Networks Junos Space before 13.3R1.8. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Describe MITRE technique T1566.002
MITRE T1566.002 : Spearphishing Link from enterprise Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. Spearphishing may also involve social engineering techniques, such as posing as a trusted source. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this case, the malicious emails contain links. Generally, the links will be accompanied by social engineering text and require the user to actively click or copy and paste a URL into a browser, leveraging [User Execution](T1204). The visited website may compromise the web browser using an exploit, or the user will be prompted to download applications, documents, zip files, or even executables depending on the pretext for the email in the first place. Adversaries may also include links that are intended to interact directly with an email reader, including embedded images intended to exploit the end system directly. Additionally, adversaries may use seemingly benign links that abuse special characters to mimic legitimate websites (known as an "IDN homograph attack").(Citation: CISA IDN ST05-016) URLs may also be obfuscated by taking advantage of quirks in the URL schema, such as the acceptance of integer- or hexadecimal-based hostname formats and the automatic discarding of text before an “@” symbol: for example, `hxxp://google.com@1157586937`.(Citation: Mandiant URL Obfuscation 2023) Adversaries may also utilize links to perform consent phishing, typically with OAuth 2.0 request URLs that when accepted by the user provide permissions/access for malicious applications, allowing adversaries to [Steal Application Access Token](T1528)s.(Citation: Trend Micro Pawn Storm OAuth 2017) These stolen access tokens allow the adversary to perform various actions on behalf of the user via API calls. (Citation: Microsoft OAuth 2.0 Consent Phishing 2021) Adversaries may also utilize spearphishing links to [Steal Application Access Token](T1528)s that grant immediate access to the victim environment. For example, a user may be lured through “consent phishing” into granting adversaries permissions/access via a malicious OAuth 2.0 request URL .(Citation: Trend Micro Pawn Storm OAuth 2017)(Citation: Microsoft OAuth 2.0 Consent Phishing 2021) Similarly, malicious links may also target device-based authorization, such as OAuth 2.0 device authorization grant flow which is typically used to authenticate devices without UIs/browsers. Known as “device code phishing,” an adversary may send a link that directs the victim to a malicious authorization page where the user is tricked into entering a code/credentials that produces a device token.(Citation: SecureWorks Device Code Phishing 2021)(Citation: Netskope Device Code Phishing 2021)(Citation: Optiv Device Code Phishing 2021)
Techniques related with vulnerability CVE-2018-11776
CVE-2018-11776 in Apache Struts. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2019-15243
CVE-2019-15243, State: PUBLISHED, Published: 2019-10-16T18:36:32.324245Z, Updated: 2024-11-20T17:06:27.049Z, Description: Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: ADJACENT_NETWORK, Availability Impact: HIGH, Base Score: 8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerability that is described in this advisory.
Describe MITRE technique T1574.002
MITRE T1574.002 : DLL Side-Loading from enterprise Adversaries may execute their own malicious payloads by side-loading DLLs. Similar to [DLL Search Order Hijacking](T1574.001), side-loading involves hijacking which DLL a program loads. But rather than just planting the DLL within the search order of a program then waiting for the victim application to be invoked, adversaries may directly side-load their payloads by planting then invoking a legitimate application that executes their payload(s). Side-loading takes advantage of the DLL search order used by the loader by positioning both the victim application and malicious payload(s) alongside each other. Adversaries likely use side-loading as a means of masking actions they perform under a legitimate, trusted, and potentially elevated system or software process. Benign executables used to side-load payloads may not be flagged during delivery and/or execution. Adversary payloads may also be encrypted/packed or otherwise obfuscated until loaded into the memory of the trusted process.(Citation: FireEye DLL Side-Loading)
Techniques related with vulnerability CVE-2012-6498
CVE-2012-6498 in Atomymaxsite 2.5 and earlier. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter. Is related with T1505.003 : Web Shell.
Techniques related with vulnerability CVE-2010-3081
CVE-2010-3081 in Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms. Is related with T1608 : Stage Capabilities.
Techniques related with vulnerability CVE-2020-11901
CVE-2020-11901 in Treck TCP/IP stack before 6.0.1.66. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1059.007 : JavaScript.
Describe the vulnerability CVE-2018-8440
CVE-2018-8440, State: PUBLISHED, Published: 2018-09-13T00:00:00, Updated: 2024-08-05T06:54:36.460Z, Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15801
CVE-2018-15801, State: PUBLISHED, Published: 2018-12-19T22:00:00Z, Updated: 2024-09-16T18:43:45.437Z, Description: Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.3, Base Severity: LOW, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11738
CVE-2020-11738, State: PUBLISHED, Published: 2020-04-13T21:20:00, Updated: 2024-08-04T11:41:59.578Z, Description: The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5271
CVE-2020-5271, State: PUBLISHED, Published: 2020-04-20T16:50:39, Updated: 2024-08-04T08:22:09.101Z, Description: In PrestaShop between versions 1.6.0.0 and 1.7.6.5, there is a reflected XSS with `date_from` and `date_to` parameters in the dashboard page This problem is fixed in 1.7.6.5, CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2012-1854
CVE-2012-1854, State: PUBLISHED, Published: 2012-07-10T21:00:00, Updated: 2024-08-06T19:08:38.695Z, Description: Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Visual Basic for Applications Insecure Library Loading Vulnerability," as exploited in the wild in July 2012., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-0262
CVE-2017-0262 in Microsoft Office. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-15182
CVE-2020-15182, State: PUBLISHED, Published: 2020-09-17T19:20:15, Updated: 2024-08-04T13:08:22.487Z, Description: The SOY Inquiry component of SOY CMS is affected by Cross-site Request Forgery (CSRF) and Remote Code Execution (RCE). The vulnerability affects versions 2.0.0.3 and earlier of SOY Inquiry. This allows remote attackers to force the administrator to edit files once the administrator loads a specially crafted webpage. An administrator must be logged in for exploitation to be possible. This issue is fixed in SOY Inquiry version 2.0.0.4 and included in SOY CMS 3.0.2.328., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.4, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-14510
CVE-2020-14510, State: PUBLISHED, Published: 2020-08-25T13:19:33.362484Z, Updated: 2024-09-16T19:25:36.335Z, Description: GateManager versions prior to 9.2c, The affected product contains a hard-coded credential for telnet, allowing an unprivileged attacker to execute commands as root., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-2729
CVE-2019-2729 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2018-11087
CVE-2018-11087 in Spring AMQP. Has primary impact with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2019-3396
CVE-2019-3396, State: PUBLISHED, Published: 2019-03-25T18:37:06.256667Z, Updated: 2024-09-16T23:30:57.985Z, Description: The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-1941
CVE-2019-1941 in Cisco Identity Services Engine Software. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2016-6909
CVE-2016-6909 in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
Describe MITRE technique T1204
MITRE T1204 : User Execution from enterprise An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as follow-on behavior from forms of [Phishing](T1566). While [User Execution](T1204) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](T1534). Adversaries may also deceive users into performing actions such as enabling [Remote Access Software](T1219), allowing direct control of the system to the adversary; running malicious JavaScript in their browser, allowing adversaries to [Steal Web Session Cookie](T1539)s; or downloading and executing malware for [User Execution](T1204).(Citation: Talos Roblox Scam 2023)(Citation: Krebs Discord Bookmarks 2023) For example, tech support scams can be facilitated through [Phishing](T1566), vishing, or various forms of user interaction. Adversaries can use a combination of these methods, such as spoofing and promoting toll-free numbers or call centers that are used to direct victims to malicious websites, to deliver and execute payloads containing malware or [Remote Access Software](T1219).(Citation: Telephone Attack Delivery)
Describe the vulnerability CVE-2020-10817
CVE-2020-10817, State: PUBLISHED, Published: 2020-03-27T18:19:48, Updated: 2024-08-04T11:14:15.566Z, Description: The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2013-1289
CVE-2013-1289, State: PUBLISHED, Published: 2013-04-09T22:00:00, Updated: 2024-08-06T14:57:04.654Z, Description: Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1, Groove Server 2010 SP1, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-0903
CVE-2019-0903, State: PUBLISHED, Published: 2019-05-16T18:17:02, Updated: 2024-08-04T17:58:59.624Z, Description: A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-9019
CVE-2019-9019 in British Airways Entertainment System. Is related with T1200 : Hardware Additions. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2012-0874
CVE-2012-0874, State: PUBLISHED, Published: 2013-02-05T23:11:00, Updated: 2024-08-06T18:38:14.958Z, Description: The (1) JMXInvokerHAServlet and (2) EJBInvokerHAServlet invoker servlets in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 do not require authentication by default in certain profiles, which might allow remote attackers to invoke MBean methods and execute arbitrary code via unspecified vectors. NOTE: this issue can only be exploited when the interceptor is not properly configured with a "second layer of authentication," or when used in conjunction with other vulnerabilities that bypass this second layer., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-13510
CVE-2019-13510 in Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation.